共 50 条
- [2] AN OWNERSHIP SHARING PROTOCOL FOR RFID WITHOUT A TRUSTED THIRD PARTY [J]. ICCNT 2009: PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTER AND NETWORK TECHNOLOGY, 2010, : 28 - 30
- [3] Does it need trusted third party? Design of buyer-seller watermarking protocol without trusted third party [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2003, 2846 : 265 - 279
- [5] Centralized Group Key Establishment Protocol without a Mutually Trusted Third Party [J]. MOBILE NETWORKS & APPLICATIONS, 2018, 23 (05): : 1132 - 1140
- [6] Centralized Group Key Establishment Protocol without a Mutually Trusted Third Party [J]. Mobile Networks and Applications, 2018, 23 : 1132 - 1140
- [7] Privacy Preserving Scalable Authentication Protocol with Partially Trusted Third Party for Distributed Internet-of-Things [J]. SECRYPT 2021: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2021, : 812 - 818
- [8] Secure pervasive computing without a Trusted Third Party [J]. IEEE/ACS INTERNATIONAL CONFERENCE ON PERVASIVE SERVICES, PROCEEDINGS, 2004, : 240 - 240
- [9] Scalable threshold scheme without a trusted third party [J]. PROCEEDINGS OF THE ICCC 2002: 15TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION, VOLS 1 AND 2: REDEFINING INTERNET IN THE CONTEXT OF PERVASIVE COMPUTING, 2002, : 853 - 858
- [10] Pseudonymous smart metering without a trusted third party [J]. 2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 1723 - 1728